Nginx is an open source high-performance web server, which has gained quite some
popularity recently. Due to its modular architecture and small footprint, it has been the default
choice for a lot of smaller Web 2.0 companies to be used as a load-balancing proxy server. It
supports most of the existing backend web protocols such as FCGI,...
SharePoint 2010 is a complex product, and a diverse skill set is required to administer it. You have to be part database administrator (DBA), part web developer, part network administrator, and part server administrator to fully wrap your mind around this product. This book was written to help you do just that.
This book is intended for individuals who are interested in the iPhone and other
iOS devices and, more importantly, in the type of data that is stored and can be
recovered from these devices. The demand for mobile forensics has grown tremendously
with the release of smart phones. Communication on these devices is now
documented...
Welcome to ActionScript. Over the next several chapters, you’ll be introduced to one of the most versatile programming languages to create web applications for the browser, desktop applications, and mobile apps for multiple platforms. For years the Flash Platform has provided people with the most powerful set of...
Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with...
The text that comprises this volume is a collection of surveys and original works from experts in the fields of algebraic number theory, analytic number theory, harmonic analysis, and hyperbolic geometry. A portion of the collected contributions have been developed from lectures given at the "International Conference on the Occasion of...
Since the pioneering work of Joseph Schumpeter (1942), it has been assumed that innovations typically play a key role in firms’ competitiveness. This assumption has been applied to firms in both developed and developing countries. However, the innovative capacities and business environments of firms in developing countries are...
“I have found this book to be a very useful classroom text, as well as a great Linux resource. It teaches Linux using a ground-up approach that gives students the chance to progress with their skills and grow into the Linux world. I have often pointed to this book when asked to recommend a solid
Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop...
The jQuery library has become increasingly popular with web application developers because of its simplicity and ease of use. The library is supported by an active community of developers and has grown significantly over the years after its inception in 2006 by John Resig. Using this library eases complicated tasks and adds to the interactive...
Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys...
Many years ago, when I had to learn C overnight to make a living as a programmer
(this was before C++), I would have given half my salary to find a mentor, a
person would say, “Here are the potholes in the road...errors that you are sure to
make in learning C. And here’s how to steer around them.” Instead, I had to...